Skip to content

Commit

Permalink
Auto-Update: 2023-12-26T21:00:25.506229+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Dec 26, 2023
1 parent 07b2224 commit 9b4d259
Show file tree
Hide file tree
Showing 125 changed files with 915 additions and 312 deletions.
8 changes: 6 additions & 2 deletions CVE-2012/CVE-2012-100xx/CVE-2012-10017.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,16 @@
"id": "CVE-2012-10017",
"sourceIdentifier": "[email protected]",
"published": "2023-12-26T10:15:07.483",
"lastModified": "2023-12-26T10:15:07.483",
"vulnStatus": "Received",
"lastModified": "2023-12-26T20:34:16.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in BestWebSoft Portfolio Plugin up to 2.04 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 2.06 is able to address this issue. The patch is named 68af950330c3202a706f0ae9bbb52ceaa17dda9d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248955."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en BestWebSoft Portfolio Plugin hasta 2.04 en WordPress. Ha sido clasificada como problem\u00e1tica. Esto afecta a una parte desconocida. La manipulaci\u00f3n conduce a cross-site request forgery. Es posible iniciar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.06 puede solucionar este problema. El parche se llama 68af950330c3202a706f0ae9bbb52ceaa17dda9d. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-248955."
}
],
"metrics": {
Expand Down
4 changes: 2 additions & 2 deletions CVE-2014/CVE-2014-1251xx/CVE-2014-125109.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2014-125109",
"sourceIdentifier": "[email protected]",
"published": "2023-12-26T15:15:08.010",
"lastModified": "2023-12-26T15:15:08.010",
"vulnStatus": "Received",
"lastModified": "2023-12-26T20:34:16.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
Expand Down
4 changes: 2 additions & 2 deletions CVE-2015/CVE-2015-101xx/CVE-2015-10127.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2015-10127",
"sourceIdentifier": "[email protected]",
"published": "2023-12-26T17:15:07.923",
"lastModified": "2023-12-26T17:15:07.923",
"vulnStatus": "Received",
"lastModified": "2023-12-26T20:34:16.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2016/CVE-2016-108xx/CVE-2016-10890.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2016-10890",
"sourceIdentifier": "[email protected]",
"published": "2019-08-21T19:15:12.340",
"lastModified": "2019-08-22T18:30:11.313",
"lastModified": "2023-12-26T19:56:27.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
Expand Down Expand Up @@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:activity_log_project:activity_log:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pojo:activity_log:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.2",
"matchCriteriaId": "BAF29181-D6BC-4EF5-B88A-D94FCD5E1589"
"matchCriteriaId": "B5F3A5EB-032F-4CEE-8011-BEBD4E5921B7"
}
]
}
Expand Down
6 changes: 3 additions & 3 deletions CVE-2016/CVE-2016-108xx/CVE-2016-10891.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2016-10891",
"sourceIdentifier": "[email protected]",
"published": "2019-08-21T19:15:12.403",
"lastModified": "2019-08-22T18:30:26.830",
"lastModified": "2023-12-26T19:56:27.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
Expand Down Expand Up @@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:activity_log_project:activity_log:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pojo:activity_log:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.3",
"matchCriteriaId": "984EC9CF-049B-4E26-8EAC-75B6217B5607"
"matchCriteriaId": "A87B55B8-2D37-4A3C-9B59-529EFD0EC923"
}
]
}
Expand Down
6 changes: 3 additions & 3 deletions CVE-2018/CVE-2018-87xx/CVE-2018-8729.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2018-8729",
"sourceIdentifier": "[email protected]",
"published": "2018-03-15T17:29:00.210",
"lastModified": "2019-02-28T13:25:58.307",
"lastModified": "2023-12-26T19:56:27.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
Expand Down Expand Up @@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:activity_log_project:activity_log:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pojo:activity_log:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.4.1",
"matchCriteriaId": "DEC9B0E5-48E9-47E4-8A8E-452B771F507C"
"matchCriteriaId": "315028FB-E4B7-4F9F-A37A-85B7C0314EDC"
}
]
}
Expand Down
26 changes: 13 additions & 13 deletions CVE-2020/CVE-2020-71xx/CVE-2020-7121.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2020-7121",
"sourceIdentifier": "[email protected]",
"published": "2020-09-23T13:15:16.030",
"lastModified": "2021-07-21T11:39:23.747",
"lastModified": "2023-12-26T19:56:27.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
Expand Down Expand Up @@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aruba:cx_6200f_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:arubanetworks:cx_6200f_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.3021",
"matchCriteriaId": "10FA7A45-DCD7-4FD6-AF8F-3F673E14F504"
"matchCriteriaId": "A77C7E5B-3EAB-4A52-99CF-D2C07B1EA823"
}
]
},
Expand All @@ -113,9 +113,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aruba:cx_6300_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:arubanetworks:cx_6300_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.3021",
"matchCriteriaId": "BAF1CE95-3E01-47F6-9784-F0F14758862E"
"matchCriteriaId": "81F5C8F4-D85F-42C9-96F7-CD91DAA94FF0"
}
]
},
Expand All @@ -141,9 +141,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aruba:cx_6400_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:arubanetworks:cx_6400_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.3021",
"matchCriteriaId": "12A59D68-3905-4ECB-9C9D-F8B53B6C58C3"
"matchCriteriaId": "C4BC17A7-2155-4A01-837B-05992EABD0D1"
}
]
},
Expand All @@ -169,9 +169,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aruba:cx_8320_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:arubanetworks:cx_8320_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.3021",
"matchCriteriaId": "D17E4F12-F8AF-4257-A66F-3D637FD778A4"
"matchCriteriaId": "0123075E-D9A9-46F4-B857-A05ABBED38B5"
}
]
},
Expand All @@ -197,9 +197,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aruba:cx_8325_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:arubanetworks:cx_8325_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.3021",
"matchCriteriaId": "60913FA8-2459-4531-9BDA-23CBBD35FF4C"
"matchCriteriaId": "D88D164C-70ED-48F4-BF0D-595A27F81B12"
}
]
},
Expand All @@ -225,9 +225,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aruba:cx_8400_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:arubanetworks:cx_8400_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.3021",
"matchCriteriaId": "F25AA559-8957-4A91-9B66-8AEEFE99B9BD"
"matchCriteriaId": "0504A5A3-A49A-4DEA-9B26-85CD6545932B"
}
]
},
Expand Down
26 changes: 13 additions & 13 deletions CVE-2020/CVE-2020-71xx/CVE-2020-7122.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2020-7122",
"sourceIdentifier": "[email protected]",
"published": "2020-09-23T13:15:16.093",
"lastModified": "2021-07-21T11:39:23.747",
"lastModified": "2023-12-26T19:56:27.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
Expand Down Expand Up @@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aruba:cx_6200f_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:arubanetworks:cx_6200f_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.1000",
"matchCriteriaId": "8AAAB31C-A0A1-4D15-841C-05FC8B990DC3"
"matchCriteriaId": "A132767A-E9B9-477E-BAAF-A831694F1FC4"
}
]
},
Expand All @@ -113,9 +113,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aruba:cx_6300_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:arubanetworks:cx_6300_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.1000",
"matchCriteriaId": "0B235A1B-2E4D-4E53-BFC2-4837E47F2D50"
"matchCriteriaId": "36CB053C-FA12-4065-BC40-FFE6E0B25B00"
}
]
},
Expand All @@ -141,9 +141,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aruba:cx_6400_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:arubanetworks:cx_6400_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.1000",
"matchCriteriaId": "13DEA0B1-4F1E-4CE4-8E9E-30ABE93FDD78"
"matchCriteriaId": "270EC51F-3CEC-45C1-9E0F-5D38EB550106"
}
]
},
Expand All @@ -169,9 +169,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aruba:cx_8320_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:arubanetworks:cx_8320_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.1000",
"matchCriteriaId": "5F999F3F-596E-4C70-9CC6-757870D1C42A"
"matchCriteriaId": "CE87AAEE-644E-4699-B639-B4CE94D503A5"
}
]
},
Expand All @@ -197,9 +197,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aruba:cx_8325_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:arubanetworks:cx_8325_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.1000",
"matchCriteriaId": "07866896-5774-489B-9760-7E0BA19BE2B8"
"matchCriteriaId": "9A5483EC-74BF-4C0D-A751-23C9ED42E29A"
}
]
},
Expand All @@ -225,9 +225,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aruba:cx_8400_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:arubanetworks:cx_8400_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.1000",
"matchCriteriaId": "CBB5C3C1-CEE4-4292-BD22-1F7627250057"
"matchCriteriaId": "B2BFEE7A-D4CC-45BF-B277-8C9849A7F616"
}
]
},
Expand Down
8 changes: 6 additions & 2 deletions CVE-2021/CVE-2021-389xx/CVE-2021-38927.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,16 @@
"id": "CVE-2021-38927",
"sourceIdentifier": "[email protected]",
"published": "2023-12-25T03:15:07.943",
"lastModified": "2023-12-25T03:15:07.943",
"vulnStatus": "Received",
"lastModified": "2023-12-26T20:34:16.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Aspera Console 3.4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 210322."
},
{
"lang": "es",
"value": "IBM Aspera Console 3.4.0 es vulnerable a cross-site scripting. Esta vulnerabilidad permite a los usuarios incrustar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista, lo que podr\u00eda conducir a la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n confiable. ID de IBM X-Force: 210322."
}
],
"metrics": {
Expand Down
8 changes: 6 additions & 2 deletions CVE-2022/CVE-2022-342xx/CVE-2022-34267.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,16 @@
"id": "CVE-2022-34267",
"sourceIdentifier": "[email protected]",
"published": "2023-12-25T08:15:07.200",
"lastModified": "2023-12-25T08:15:07.200",
"vulnStatus": "Received",
"lastModified": "2023-12-26T20:34:16.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in RWS WorldServer before 11.7.3. Adding a token parameter with the value of 02 bypasses all authentication requirements. Arbitrary Java code can be uploaded and executed via a .jar archive to the ws-api/v2/customizations/api endpoint."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en RWS WorldServer antes de la versi\u00f3n 11.7.3. Agregar un par\u00e1metro de token con el valor 02 omite todos los requisitos de autenticaci\u00f3n. Se puede cargar y ejecutar c\u00f3digo Java arbitrario a trav\u00e9s de un archivo .jar en el punto final ws-api/v2/customizations/api."
}
],
"metrics": {},
Expand Down
8 changes: 6 additions & 2 deletions CVE-2022/CVE-2022-342xx/CVE-2022-34268.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,16 @@
"id": "CVE-2022-34268",
"sourceIdentifier": "[email protected]",
"published": "2023-12-25T08:15:07.353",
"lastModified": "2023-12-25T08:15:07.353",
"vulnStatus": "Received",
"lastModified": "2023-12-26T20:34:16.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in RWS WorldServer before 11.7.3. /clientLogin deserializes Java objects without authentication, leading to command execution on the host."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en RWS WorldServer antes de la versi\u00f3n 11.7.3. /clientLogin deserializa los objetos Java sin autenticaci\u00f3n, lo que lleva a ejecuci\u00f3n de comandos en el host."
}
],
"metrics": {},
Expand Down
10 changes: 5 additions & 5 deletions CVE-2022/CVE-2022-34xx/CVE-2022-3458.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2022-3458",
"sourceIdentifier": "[email protected]",
"published": "2022-10-12T07:15:08.947",
"lastModified": "2023-11-07T03:51:16.703",
"lastModified": "2023-12-26T19:56:27.157",
"vulnStatus": "Modified",
"descriptions": [
{
Expand Down Expand Up @@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.1",
Expand All @@ -60,7 +60,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "[email protected]",
"type": "Primary",
"description": [
{
Expand All @@ -79,8 +79,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:human_resource_management_system_project:human_resource_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F568F825-03F3-4EA1-8140-AD0DCA462881"
"criteria": "cpe:2.3:a:oretnom23:human_resource_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB20CFC6-02D1-4450-93F7-8C2BF9847907"
}
]
}
Expand Down
10 changes: 5 additions & 5 deletions CVE-2022/CVE-2022-34xx/CVE-2022-3470.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2022-3470",
"sourceIdentifier": "[email protected]",
"published": "2022-10-13T04:15:10.663",
"lastModified": "2023-11-07T03:51:17.760",
"lastModified": "2023-12-26T19:56:27.157",
"vulnStatus": "Modified",
"descriptions": [
{
Expand Down Expand Up @@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.1",
Expand All @@ -60,7 +60,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "[email protected]",
"type": "Primary",
"description": [
{
Expand All @@ -79,8 +79,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:human_resource_management_system_project:human_resource_management_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C5C133F-B37C-426F-AD4A-AB08AE877278"
"criteria": "cpe:2.3:a:oretnom23:human_resource_management_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81ABE38B-3546-42D5-AE86-792E08CD3472"
}
]
}
Expand Down
Loading

0 comments on commit 9b4d259

Please sign in to comment.